Cyber Security for Edge/Fog Computing Applications

Research output: Chapter in Book/Report/Conference proceedingChapter

7 Citations (Scopus)

Abstract

Using edge/fog computing as a distributed entity solves some problems of centralized platforms. Due to the huge number of generated data sensed by the Internet of Things (IoT) devices, efficient processing and data analysis, especially for time-sensitive applications, become necessary. Deploying edge/fog computing solutions offers several benefits, such as closeness to the end user, quick response time, offloading cloud servers, etc. However, this solution can be an attractive target for cyber crime due to its distributed nature, which facilitates the spread of potential threats and risks and affects many devices and much data. Also, edge/fog computing devices are placed in locations and are hosted remotely, which makes them vulnerable to physical damage. In addition, the heterogeneity of edge/fog solutions and IoT devices creates an inconsistency in standardization. Thus providing an optimal security solution for edge/fog computing is significantly challenging. This chapter provides an overview of cyber security for edge/fog computing applications, including the potential risks and threats to edge/fog computing systems, common attack vectors and their impact, and measures and best practices for edge/fog computing security. It highlights the emergent technology and techniques used for security while concluding with some future directions.

Original languageEnglish
Title of host publicationCyber Security for Next-Generation Computing Technologies
PublisherCRC Press
Pages177-189
Number of pages13
ISBN (Electronic)9781003826408
ISBN (Print)9781032518992
DOIs
Publication statusPublished - Jan 1 2024

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Cyber Security for Edge/Fog Computing Applications'. Together they form a unique fingerprint.

Cite this